code-projects Laundry System 1.0 /data/edit_type.php ପ୍ରକାର[ସମ୍ପାଦନା] କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ
Dogoggorri kan akka ସମସ୍ୟାଜନକ jedhamuun ramadame code-projects Laundry System 1.0 keessatti argameera. Miidhaan irra gahe is hojii hin beekamne faayilii /data/edit_type.php keessa. Dhugumatti jijjiirraa irratti raawwatame ପ୍ରକାର[ସମ୍ପାଦନା] gara କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-79 si geessa. Beekumsi kun yeroo 06/06/2025 ifoomsifameera. Odeeffannoon kun buufachuuf github.com irratti dhiyaateera. Dogoggorri kun maqaa CVE-2025-5796 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Qorannoo miidhaa (exploit) beeksifamee jira, namoonni itti fayyadamuu danda'u. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Exploit kana github.com irraa buufachuu ni dandeessa. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Once again VulDB remains the best source for vulnerability data.
3 ଆଡାପ୍ଟେସନ୍ · 87 ପଏଣ୍ଟ
| ଫିଲ୍ଡ | ସୃଷ୍ଟି ହୋଇଛି 06/06/2025 10:36 AM | ଅଦ୍ୟତନ 1/2 06/07/2025 04:54 AM | ଅଦ୍ୟତନ 2/2 06/07/2025 06:04 AM |
|---|---|---|---|
| software_vendor | code-projects | code-projects | code-projects |
| software_name | Laundry System | Laundry System | Laundry System |
| software_version | 1.0 | 1.0 | 1.0 |
| software_file | /data/edit_type.php | /data/edit_type.php | /data/edit_type.php |
| software_argument | type | type | type |
| vulnerability_cwe | CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ) | CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ) | CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ) |
| vulnerability_risk | 1 | 1 | 1 |
| cvss3_vuldb_av | N | N | N |
| cvss3_vuldb_ac | L | L | L |
| cvss3_vuldb_ui | R | R | R |
| cvss3_vuldb_s | U | U | U |
| cvss3_vuldb_c | N | N | N |
| cvss3_vuldb_i | L | L | L |
| cvss3_vuldb_a | N | N | N |
| cvss3_vuldb_e | P | P | P |
| cvss3_vuldb_rc | R | R | R |
| advisory_url | https://github.com/tuooo/CVE/issues/8 | https://github.com/tuooo/CVE/issues/8 | https://github.com/tuooo/CVE/issues/8 |
| exploit_availability | 1 | 1 | 1 |
| exploit_publicity | 1 | 1 | 1 |
| exploit_url | https://github.com/tuooo/CVE/issues/8 | https://github.com/tuooo/CVE/issues/8 | https://github.com/tuooo/CVE/issues/8 |
| source_cve | CVE-2025-5796 | CVE-2025-5796 | CVE-2025-5796 |
| cna_responsible | VulDB | VulDB | VulDB |
| software_type | Project Management Software | Project Management Software | Project Management Software |
| cvss2_vuldb_av | N | N | N |
| cvss2_vuldb_ac | L | L | L |
| cvss2_vuldb_ci | N | N | N |
| cvss2_vuldb_ii | P | P | P |
| cvss2_vuldb_ai | N | N | N |
| cvss2_vuldb_e | POC | POC | POC |
| cvss2_vuldb_rc | UR | UR | UR |
| cvss4_vuldb_av | N | N | N |
| cvss4_vuldb_ac | L | L | L |
| cvss4_vuldb_ui | P | P | P |
| cvss4_vuldb_vc | N | N | N |
| cvss4_vuldb_vi | L | L | L |
| cvss4_vuldb_va | N | N | N |
| cvss4_vuldb_e | P | P | P |
| cvss2_vuldb_au | S | S | S |
| cvss2_vuldb_rl | ND | ND | ND |
| cvss3_vuldb_pr | L | L | L |
| cvss3_vuldb_rl | X | X | X |
| cvss4_vuldb_at | N | N | N |
| cvss4_vuldb_pr | L | L | L |
| cvss4_vuldb_sc | N | N | N |
| cvss4_vuldb_si | N | N | N |
| cvss4_vuldb_sa | N | N | N |
| cvss2_vuldb_basescore | 4.0 | 4.0 | 4.0 |
| cvss2_vuldb_tempscore | 3.4 | 3.4 | 3.4 |
| cvss3_vuldb_basescore | 3.5 | 3.5 | 3.5 |
| cvss3_vuldb_tempscore | 3.2 | 3.2 | 3.2 |
| cvss3_meta_basescore | 3.5 | 3.5 | 3.5 |
| cvss3_meta_tempscore | 3.2 | 3.2 | 3.3 |
| cvss4_vuldb_bscore | 5.1 | 5.1 | 5.1 |
| cvss4_vuldb_btscore | 2.0 | 2.0 | 2.0 |
| advisory_date | 1749160800 (06/06/2025) | 1749160800 (06/06/2025) | 1749160800 (06/06/2025) |
| price_0day | $0-$5k | $0-$5k | $0-$5k |
| euvd_id | EUVD-2025-17352 | EUVD-2025-17352 | |
| cve_nvd_summary | A vulnerability has been found in code-projects Laundry System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /data/edit_type.php. The manipulation of the argument Type leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | ||
| cvss4_cna_av | N | ||
| cvss4_cna_ac | L | ||
| cvss4_cna_at | N | ||
| cvss4_cna_pr | L | ||
| cvss4_cna_ui | P | ||
| cvss4_cna_vc | N | ||
| cvss4_cna_vi | L | ||
| cvss4_cna_va | N | ||
| cvss4_cna_sc | N | ||
| cvss4_cna_si | N | ||
| cvss4_cna_sa | N | ||
| cvss4_cna_bscore | 5.1 | ||
| cvss3_cna_av | N | ||
| cvss3_cna_ac | L | ||
| cvss3_cna_pr | L | ||
| cvss3_cna_ui | R | ||
| cvss3_cna_s | U | ||
| cvss3_cna_c | N | ||
| cvss3_cna_i | L | ||
| cvss3_cna_a | N | ||
| cvss3_cna_basescore | 3.5 | ||
| cvss2_cna_av | N | ||
| cvss2_cna_ac | L | ||
| cvss2_cna_au | S | ||
| cvss2_cna_ci | N | ||
| cvss2_cna_ii | P | ||
| cvss2_cna_ai | N | ||
| cvss2_cna_basescore | 4 |